Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    UID:
    edoccha_9961447771002883
    Umfang: 1 online resource (503 pages)
    Ausgabe: 1st ed.
    ISBN: 3-031-55221-0
    Serie: Studies in Big Data Series ; v.147
    Anmerkung: Intro -- Contents -- Social Media and Digital Transformation in Business -- Impact of Social Media Usage on the Effectiveness of Higher Education Institutions: Evidence from India -- 1 Introduction -- 1.1 Problem Statement -- 1.2 Significance of the Study -- 1.3 Objectives of the Study -- 2 Literature Review -- 2.1 Hypothesis Development -- 3 Methodology -- 3.1 Research Design and Technique -- 4 Data Analysis -- 4.1 Personal Details -- 4.2 Social Media Usage Details -- 4.3 Impact of Social Media on Academic Performance -- 4.4 Relationship Between Age and Impact of Social Media -- 4.5 Relationship Between Gender and Impact of Social Media -- 4.6 Relationship Between Educational Status and Impact of Social Media -- 4.7 Relationship Between Stream of the Study and Impact of Social Media -- 4.8 Relationship Between Place of Education and Impact of Social Media -- 4.9 Relationship Between Location of the College/University and Impact of Social Media -- 4.10 Relationship Between Type of Social Media Using More and Impact of Social Media -- 4.11 Relationship Between Period of Using and Impact of Social Media -- 4.12 Relationship Between Frequency of Using and Impact of Social Media -- 4.13 Relationship Between Type of e-Gadget Using and Impact of Social Media -- 4.14 Degree of Relationship Between Selected Variables and Impact of Social Media (Correlation Analysis) -- 4.15 Impact of Social Media (Multiple Regression Analysis) -- 5 Discussion -- 5.1 From the Personal Details -- 5.2 From the Social Media Usage Details -- 5.3 From the Impact of Social Media on Academic Performance, -- 6 Conclusion -- 7 Implications/Future Recommendations -- References -- Using Machine Learning to Protect Users Accounts in Twitter -- 1 Introduction -- 1.1 Problem Statement -- 1.2 Proposed Solution -- 2 Literature Review -- 2.1 Semantic Modeling -- 3 Methodology. , 4 Discussion -- 5 Conclusion -- References -- Digital Transformation and Disruptive Technologies: Effect of Cloud Computing and Devops on Managing Projects -- 1 Introduction -- 2 Literature Review -- 2.1 Business -- 2.2 Technology -- 2.3 Industry -- 2.4 Society -- 3 Research Methododology -- 4 Discussion -- 5 Conclusion and Recommendation -- References -- Digital Transformation and Digital Disruption Technologies: The Effect of AI and Machine Learning on Managing Projects -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 SWOT Analysis: -- 4 Empirical Analysis -- 5 Disscusion -- 6 Conclusion -- 7 Summary -- 8 Recommendations -- References -- Systematic Literature Review and Assessment for Cyber Terrorism Communication and Recruitment Activities -- 1 Introduction -- 1.1 Available Research and Findings -- 1.2 Research Objectives -- 1.3 Design and Contributions -- 2 Related Work -- 3 Research Techniques -- 3.1 Selection of Elementary Studies -- 3.2 Criteria for Article (Inclusion and Exclusion) Analysis -- 3.3 Outcome Identification -- 3.4 Qualitative Assessment -- 3.5 Data Extraction Process -- 3.6 Data Analysis -- 4 Outcomes -- 5 Analysis and Discussion -- 6 TNA Cybercrime Future Scope -- 7 Concluding Remark and Future Work -- References -- Digitalization in Accounting and Auditing -- Business Digitalization in Accounting and Auditing Fields -- 1 Introduction -- 2 Literature Review -- 2.1 eXtensible Business Reporting Language (XBRL) -- 2.2 Big Data and Enterprise Resource Planning (ERP) -- 2.3 Blockchain Technology, XBRL, and Audit Confirmations -- 3 Methodology -- 4 Empirical Discussion -- 4.1 Big Data and Enterprise Resource Planning (ERP) Implementation -- 4.2 Blockchain Technology, XBRL, and Audit Confirmations -- 5 Discussion -- 6 Conclusions -- 7 Recommendations -- References. , Accountants' Perception and Essential Skills on Blockchain Technology -- 1 Introduction -- 2 Literature Review -- 2.1 Types of Blockchain -- 2.2 Problem Statement and Research Contribution -- 3 Methodology -- 4 Empirical Analysis -- 4.1 Demographic and Descriptive Analysis -- 4.2 Reliability and Validity -- 4.3 Discriminant Validity -- 4.4 Correlation Analysis -- 4.5 Test of Hypotheses: The Regression Analysis -- 5 Discussion -- 6 Conclusion -- 7 Future Implications and Recommendations -- References -- Management Accounting Systems and Data Analytics in the United States: Evidence from Apple -- 1 Introduction -- 1.1 Job Costing System -- 1.2 Process Costing Systems -- 1.3 Hybrid Costing System -- 1.4 Traditional Costing System -- 1.5 Activity-Based Accounting System -- 1.6 Budgeting System -- 2 Literature Review -- 2.1 Management Accounting in the USA -- 2.2 Management Accounting and Data Analytics in the USA -- 2.3 Challenges in Data Analytics -- 3 Methodology -- 4 Research Description -- 4.1 History of Apple -- 4.2 Management Accounting in Apple Incorporation -- 5 Empirical Analysis -- 6 Discussion -- 7 Conclusions -- References -- Accounting Information Systems' Control and Security: Do External Auditors Need to Set a Paragraph Within Their Report? -- 1 Introduction -- 2 Literature Review -- 2.1 Introductory Paragraph -- 2.2 Management's Responsibility -- 2.3 Auditor's Responsibility -- 2.4 Auditor's Opinion -- 2.5 Signature of the Auditor -- 2.6 Date of the Audit Report -- 2.7 Auditor's Address -- 2.8 Audit Expectation Gap -- 2.9 Accounting Information Systems -- 3 Methodology -- 4 Empirical Analysis -- 5 Discussion -- 6 Conclusions -- 7 Recommendations -- References -- Advanced Technologies in Data Analysis and Management -- Genetic Algorithm-Based Feature Selection and Self-Organizing Auto-Encoder (Soae) for Snp Genomics Data Classifications. , 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 SNP Dataset -- 3.2 Pre-Processing -- 3.3 Encoding Method -- 3.4 Feature Selection (FS) by Genetic Algorithm (GA) -- 3.5 Deep Self-Organizing Auto-Encoder (SOAE) -- 4 Data Analysis -- 5 Results and Discussion -- 6 Conclusion and Future Recomendations -- References -- An Effect of Big Data Analytics on Pandemic Prevention -- 1 Introduction -- 1.1 Applications of Data Analytics in COVID-19 -- 2 Literature Review -- 2.1 Big Data Analytics Tools -- 3 Methodology -- 4 Data Analysis -- 5 Discussion -- 5.1 Findings -- 5.2 Issues -- 5.3 Sharing Data -- 5.4 Information Correctness -- 5.5 Collaboration with Patients -- 6 Conclusion -- References -- Data Warehousing for Assisting the Decision Makers -- 1 Introduction -- 1.1 Problem Definition -- 1.2 Proposed Solutions -- 2 Literature Review -- 3 Methodology -- 4 Discussion -- 5 Conclusion -- References -- Implementing Machine Learning for the Analysis of Data -- 1 Introduction -- 1.1 Problem Definition -- 2 Literature Review -- 3 Research Methodology -- 3.1 Systemic Experimentation -- 3.2 Controlling for Variance -- 3.3 Experiments in Machine Learning -- 4 Conclusions -- References -- Review of Artificial Intelligence and Machine Learning Recent Advancements -- 1 Introduction -- 1.1 Problem Definition -- 1.2 Proposed Solution -- 2 Literature Review -- 3 Research Methodology (Experimental Evaluation) -- 4 Discussion -- 5 Conclusions -- References -- Digital Wallets, E-commerce, and Consumer Perspectives -- Evaluation of Purchasers Mentalities When Buying IoT Home Security Devices -- 1 Introduction -- 2 Literature Review -- 3 Research Methodology -- 4 Data Analysis -- 4.1 Demographics Analysis -- 4.2 Descriptive Statistics -- 4.3 Measurement Model Fit Statistics -- 4.4 Measurement Model Convergent Validity -- 5 Discussion -- 6 Conclusions -- References. , Digital Wallet System Development and Evaluation -- 1 Introduction -- 1.1 Problem Definition -- 1.2 Research Objective -- 2 Literature Review -- 3 Methodology -- 3.1 Questionnaire Creation -- 3.2 Pre-test Using a Questionnaire -- 4 Data Analysis -- 4.1 State the Design Space -- 4.2 Interface Evaluation -- 4.3 Solution Suggested -- 4.4 Understand the Interaction Design Principles in UX -- 4.5 Undesirable Aspects Boring: The Website Was not Boring Because It Met All of the Standards in Terms of Operations -- 5 Results and Discussion -- 6 Conclusion -- 7 Future Recommendations -- References -- Entrepreneurship and Technology Diversification: A Strategy or Desperation? FAM Case Study -- 1 Introduction -- 2 Theoretical Framework and Corporate History -- 2.1 The Promoter's Profile -- 3 Literature Review and FAM Case -- 4 Discussion -- 4.1 The Case in Hand -- 4.2 Diversification-What Drives It? -- 4.3 Current Scenario-The GCC -- 4.4 The Shift Towards Mid-Market Segment -- 4.5 Asian and Global Developments -- 4.6 Dubai Realty Trends -- 4.7 Value Driven Market -- 4.8 Supply-Led Pricing -- 4.9 Rentals -- Appendix -- Entrepreneurship Survey -- Diversification -- References -- Internet of Things (IoT) and the Medical Field -- Security Flaws in Medical Wearables Devices Used in Health Care Systems -- 1 Introduction -- 1.1 Problem Definition -- 1.2 Proposed Solution -- 2 Literature Review -- 3 Research Methodology -- 4 Conclusions -- References -- Evaluation of Ethics and Security Challenges in Internet of Medical Things (IoMT) -- 1 Introduction -- 1.1 Problem Statement -- 2 Literature Review -- 2.1 Confidentiality -- 2.2 2Attacks Types in IoMT -- 3 Methodology -- 4 Discussion -- 5 Conclusions -- References -- Data Protection and Privacy Management for Healthcare Wearable Devices -- 1 Introduction -- 1.1 Problem Statement -- 2 Literature Review -- 3 Methodology. , 4 Conclusions.
    Weitere Ausg.: ISBN 3-031-55220-2
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz